Академический Документы
Профессиональный Документы
Культура Документы
Introduction
The dimensions of warfare have evolved over the centuries from Land and Sea to encompass
Air and Outer Space in the 20th Century. While land is integral to a nation, occupied and
defended, sea and air are common pool resources that are sought to be dominated even beyond
own territory. The decade of the sixties saw the emergence of space as the new arena of
competition, with the proliferation of satellites and missiles driving the cold war. Technological
developments have driven lethality, range and speed in all four domains to their maximum limits.
With the heavy dependence on networks in the 21st Century, Cyberspace has emerged as the
fifth dimension of warfare, with critical importance for the projection of military force.
In the previous part of this two-piece write-up, the emergence of Cyberspace as an operational
domain of warfare, as well as the types and classifications of cyber-attacks/ cyberwar were
discussed. In this follow-up part, some real-world examples of cyberwar over the past decade
will be described, and certain doctrinal aspects related to offensive cyberwar strategies as well
as some legal implications of conducting cyberwar will be dwelt upon.
Stuxnet (2010)
In 2010, the Stuxnet computer worm may have accomplished what five years of United Nations
Security Council resolutions could not: disrupt Iran’s pursuit of a nuclear bomb. Stuxnet is
essentially considered the world’s first digital weapon. It was developed by the American and
Israeli governments and used to wreak havoc on an Iranian nuclear facility called Natanz. It
targeted the computer systems used to control the centrifuges used to enrich uranium, and
instructed them to spin the machines out of control. Eventually that force broke the centrifuges.
Over a few years, about 20 percent of Iran’s centrifuges spun out of control and were destroyed.
Stuxnet was the first malware that actually physically destroyed something. In just a few years
since the Stuxnet attack came to light, a lot has changed in the cyber warfare realm, and there
have been other similar attacks that target critical infrastructure of adversary countries [2, 3].
Ukraine (2015)
Through its cyber campaign in 2015, Russia was able to quietly and persistently compromise
the Ukrainian government and military’s ability to communicate and operate, thereby
undermining the legitimacy and authority of Ukrainian political and military institutions. In late
December, 2015, however, Russia appeared to signal its capability and a willingness to expand
its use of offensive cyber operations to achieve kinetic effects by damaging Ukrainian critical
infrastructure. Pro-Russian cyber actors departed from what were basically nuisance attacks
and perpetrated what is believed to be the first cyberattack on another country’s electric power
grid. In an attack that has been widely attributed to Russia, coordinated and synchronized
cyberattacks targeted three separate distribution centres of a Ukrainian power company in
Western Ukraine. Using remote access to control and operate breakers, the attackers took the
distribution centres offline, causing power outages that affected more than 220,000 Ukrainian
residents. The attack would seem to fall under the rubric of information warfare principles, in
that its impact was mainly psychological. It emphasized the ramifications of Kiev’s anti-Russian
policies while undermining the confidence of Ukraine’s citizens in their government.
Cyber Deterrence
It is often said that, in defence strategies, deterrence precedes protection, resilience and
response. Nuclear deterrence has largely been responsible for a reduction in large-scale
conventional conflicts after World War II. Conventional military capabilities also have significant
deterrence value. Given the ‘non-attributable’ as well as ‘asymmetric’ characteristics of cyber-
attacks, the concept of deterrence in the cyber domain takes on a different flavour, making it a
subject of study by the major players in cyberspace. However, it is fairly evident that there can
be no effective cyber defence strategy based purely on a protection/ resilience/ response
paradigm. In this regard, the connotations and inter-se importance of Deterrence-by-Denial vis-
à-vis Deterrence-by-Retaliation in the cyber domain assumes importance. Clearly, a pre-
requisite for achieving deterrence-by-retaliation is the possession of offensive cyber capabilities
[4].
Offensive Defence
Sometimes termed “Active Defence,” in military operations it is often stated that offence is the
best form of defence. Although both “Deterrence” as well as “Active Defence” need offensive
capabilities, there is a difference in the two concepts, in that the former implies a “force in being”
while the latter involves the actual employment of offensive capabilities. Both involve the
possession and employment of offensive cyber capabilities, which therefore need to be
developed and used to advantage towards protecting our national cyberspace [5].
Conclusion
In this write-up, it has been brought out that Cyberspace has emerged as the fifth dimension of
warfare in addition to land, sea, air and space. While the latter four are physical domains,
Cyberspace lies in the Information domain. In order to prevent our information infrastructure
from being adversely affected during any future conflict, there is an urgent requirement to have
comprehensive organizations not only at national level but at tri-services and individual services
levels as well. Failure to adapt to this new domain of warfare will tilt the balance in favour of
adversaries in future wars.
References
[1] Michael Connell and Sarah Vogel, Russia’s Approach to Cyber Warfare, CNA Occasional
Paper, Mar 2017, pp. 13, 17, 19, Accessed 28 Sep 2020,
https://www.cna.org/CNA_files/PDF/DOP-2016-U-014231-1Rev.pdf.
[2] Jo Lauder, Stuxnet: The Real Life Sci-Fi Story of ‘the World’s First Digital Weapon, 12
Oct 2016, Accessed 28 Sep 2020, http://www.abc.net.au/triplej/programs/hack/the-worlds-first-
digital-weapon-stuxnet/7926298.
[3] Kenneth Geers, Strategic Cyber Security, NATO Cooperative Cyber Defence Centre of
Excellence, 2011, pp. 13, Accessed 28 Sep 2020,
https://ccdcoe.org/uploads/2018/10/2011_Proceedings_0-1.pdf.
[4] Martin Libicki, Cyberdeterrence and Cyberwar, Proj AF, 2009, RAND, Accessed 28 Sep
20, https://www.rand.org/content/dam/rand/pubs/monographs/2009/RAND_MG877.pdf.
[5] Lt Gen (Dr) R S Panwar, Strategic Thinking for Security - Defending the National
Cyberspace – Part II, 28 Jan 2018, NASSCOM-DSCI, Accessed 28 Sep 2020,
https://www.dsci.in/blogs/strategic-thinking-for-cyberspace-security-part-ii/.